Kamil Bojarski · @lawsecnet
244 followers · 50 posts · Server infosec.exchange

And that's a wrap for the first day of
@SANSInstitute
class where I have a great pleasure of supporting
Peter s14 Szczepankiewicz.
It is always great to meet new students and have (intelligence) fun exploring all aspect of the discipline. And tomorrow intrusion analysis awaits!

#FOR578

Last updated 2 years ago

whois · @whois
116 followers · 26 posts · Server infosec.exchange

Long time no training.

This week I am gonna attend @sansforensics live online course. 👀

It will be my first ✨online✨ SANS course, wish me luck with my adhd.

#FOR578

Last updated 2 years ago

Kamil Bojarski · @lawsecnet
193 followers · 33 posts · Server infosec.exchange

capstone in progress! As it is an analytical challenge it is always exciting to see how different groups approach the issue in a different way. media3.giphy.com/media/3oeSAz6

#FOR578

Last updated 2 years ago

Kamil Bojarski · @lawsecnet
216 followers · 35 posts · Server infosec.exchange

capstone in progress! As it is an analytical challenge it is always exciting to see how different groups approach the issue in a different way. media3.giphy.com/media/3oeSAz6

#FOR578

Last updated 2 years ago

Kamil Bojarski · @lawsecnet
175 followers · 31 posts · Server infosec.exchange

Starting soon day 5 of the @sansinstitute class - this day is dedicated to topics of dissemination of intelligence products and attribution of malicious activity. I like how in this course you can really see how subsequent bricks of intelligence process - setting requirements, analysis of malicious activity, collection from external sources, analysis and processing come together to allow making analytical judgements.
And tomorrow of course capstone were students will be able to put into practise skills that they acquired through the week :)

#FOR578

Last updated 2 years ago

Kamil Bojarski · @lawsecnet
216 followers · 35 posts · Server infosec.exchange

Starting soon day 5 of the @sansinstitute class - this day is dedicated to topics of dissemination of intelligence products and attribution of malicious activity. I like how in this course you can really see how subsequent bricks of intelligence process - setting requirements, analysis of malicious activity, collection from external sources, analysis and processing come together to allow making analytical judgements.
And tomorrow of course capstone were students will be able to put into practise skills that they acquired through the week :)

#FOR578

Last updated 2 years ago

Kamil Bojarski · @lawsecnet
169 followers · 28 posts · Server infosec.exchange

Starting tomorrow until Saturday I will be supporting the very awesome @likethecoins as a vTA during the @sansinstitute Cyber Defense Initiative 2022 class. Looking forward to meeting all the students and having lot of threat intelligence fun.
See you there (online)!

#FOR578

Last updated 2 years ago

Jeremy Wiedner · @cybersheepdog
6 followers · 10 posts · Server infosec.exchange

During from about 2 months ago we discussed Intrusion Analysis and the Diamond Model. I then found a "Report Template for Threat Intelligence and Incident Response" in Word and PDF Format created by @lennyzeltser. I put it into an Excel format and added in Diamond Model visualizations as I thought it might be useful to track the vertices based on phase as well as during each COA during IR. Hope at least someone finds it useful.

It can be found at github.com/cybersheepdog/Repor

#FOR578 #cyberthreatintelligence #sansinstitute #cyberkillchain

Last updated 2 years ago